<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: port 2122 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-2122/m-p/1073057#M961890</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you issue access-group outside_acl in interface outside after the access-list outside_acl permit tcp any interface outside eq 2122, you are applying the newly created  line in access list outcide_acl to the outside interface,  if you don't apply it the outside interface most likely  will not allow tcp 2122 towards the natted address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3389, 5001 are working because at some point in time the &lt;B&gt;outside_acl&lt;/B&gt; access list  for those ports were also apply to the outside interface in the same fasion. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Dec 2008 23:26:57 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-12-04T23:26:57Z</dc:date>
    <item>
      <title>port 2122</title>
      <link>https://community.cisco.com/t5/network-security/port-2122/m-p/1073053#M961884</link>
      <description>&lt;P&gt;I have a pic 506e and i need to open up port 2122 to accept incoming commections to the internal IP of 10.9.2.202 I have posted my config below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname ABVALVE&lt;/P&gt;&lt;P&gt;domain-name extechla.com&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol icmp error&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.9.2.202 E1505&lt;/P&gt;&lt;P&gt;name 10.9.2.252 Printer&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any interface outside eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any interface outside eq 5001&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 10.9.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location E1505 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location Printer 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 E1505 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5001 Printer 5001 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.9.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.9.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address E1505-10.9.2.250 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 200&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-2122/m-p/1073053#M961884</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2020-02-21T11:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: port 2122</title>
      <link>https://community.cisco.com/t5/network-security/port-2122/m-p/1073054#M961886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Simple&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2122  10.9.2.202 2122  netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any interface outside eq 2122 &lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Dec 2008 17:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-2122/m-p/1073054#M961886</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-12-02T17:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: port 2122</title>
      <link>https://community.cisco.com/t5/network-security/port-2122/m-p/1073055#M961887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny,  were you able to open up the necesary 2122 tcp port you had asked, just want to make sure you are ok with configuration or if you need more help, just let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Dec 2008 00:56:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-2122/m-p/1073055#M961887</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-12-04T00:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: port 2122</title>
      <link>https://community.cisco.com/t5/network-security/port-2122/m-p/1073056#M961889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i understand &lt;/P&gt;&lt;P&gt;this line:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2122 10.9.2.202 2122 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this line:&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any interface outside eq 2122 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand&lt;/P&gt;&lt;P&gt;this line:&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my confusion is: as reading this last line that you are telling the "access-group outside_acl" to use "interface outside" for all the incoming connections... but the rdp port 3389 and the media port 5001 are working even now without this line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elaborate please...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Dec 2008 09:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-2122/m-p/1073056#M961889</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-12-04T09:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: port 2122</title>
      <link>https://community.cisco.com/t5/network-security/port-2122/m-p/1073057#M961890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you issue access-group outside_acl in interface outside after the access-list outside_acl permit tcp any interface outside eq 2122, you are applying the newly created  line in access list outcide_acl to the outside interface,  if you don't apply it the outside interface most likely  will not allow tcp 2122 towards the natted address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3389, 5001 are working because at some point in time the &lt;B&gt;outside_acl&lt;/B&gt; access list  for those ports were also apply to the outside interface in the same fasion. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Dec 2008 23:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-2122/m-p/1073057#M961890</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-12-04T23:26:57Z</dc:date>
    </item>
  </channel>
</rss>

